Product Details

Network Hacking Continued: Intermediate to Advanced

Learn Advanced Techniques to Hack Into WiFi & Wired Networks

Description

Course Description

This advanced network hacking course is designed to build on your foundational knowledge. It aims to break down each attack into smaller components so you can understand how each of these components works. By the end of the course, you’ll be able to mix attacks and adopt attacks to suit different situations and different scenarios, as well as know how to write your own man in the middle scripts to implement your own man in the middle attacks.

Access 83 lectures & 10 hours of content 24/7

Learn how to extend the pre-connection attacks that you already know

Extend the deauthentication attack to target multiple clients & multiple networks at once

Understand a number of advanced techniques to gain access to various network configurations & encryptions

Instructor

Instructor

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Access

Lifetime

Content

16 hours

Lessons

92

The Complete Ethical Hacking Course: Beginner to Advanced 2.0

Everything You Need to Know About the Art of Ethical Hacking

Description

Course Description

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or elevate your IT career, this is the course for you. Here, you’ll learn from experienced network security professionals while covering the most important topics in ethical hacking today.

Access 92 lectures & 16 hours of content 24/7

Get an introduction to ethical hacking

Learn how to install Linux, terminal basics, & Wireshark setup

Understand how to stay anonymous online & access the dark web using TOR

Explore aircark-ng, HashCat, & WiFi hacking

Defend your own networks from attacks

Clone websites

Specs

Important Details

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

Requirements

Internet required

Instructor

Instructor

Arsalan Saleem is a Security Expert and Software Developer with 7+ years experience. He loves to work on innovative offensive security ideas. He has developed many web applications and mobile applications and has also worked on the security of industrial software.

Access

Lifetime

Content

1 hours

Lessons

17

How to Hack WiFi Networks for Beginners

Learn How to Hack WEP, WPA & WPA2 Networks

Description

Course Description

This course is all about WiFi and the security of wireless networks. You’ll study different threats, weaknesses, and attack methods for WiFi hacking. After completing this course, you’ll be confident with breaking all types of WiFi encryption methods.

Instructor

Instructor

Nicolae Juravlea loves computers and technology, particularly in the areas of wireless encryption protocols, web development, network security, and anonymity. He has worked on various projects involving web design, networking, web application security, and other technology-related subjects.

Access

Lifetime

Content

4.5 hours

Lessons

56

The Complete Nmap Ethical Hacking Course: Network Security

Become an Ethical Hacking & Network Security Expert Using Nmap

Description

Course Description

Nmap is the internet’s most popular network scanner with advanced features that even seasoned professionals don’t know about. In this complete course, you’ll uncover secrets of ethical hacking and network discovery using Nmap. You’ll go from beginner to expert in easy to follow, structured steps covering all major platforms including Windows, Mac, Linux, and Kali. At the end of the course, you’ll have a practical skill set in using Nmap to scan networks.

Access 56 lectures & 4.5 hours of content 24/7

Become an expert in using Nmap for ethical hacking, system administration & network security

Learn how to successfully discover active & vulnerable hosts on a network

Master service detection, version detection, operating system detection, & optimizing timing and performance

Understand how Nmap is used in combination w/ criminal hacking infrastructures

Cover both the command line version of Nmap & the GUI version of Nmap called Zenmap

Specs

Important Details

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

Requirements

Internet required

Instructor

Instructor

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK’s mobile banking and payment solutions helping secure to date over £71Bn in transactions.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan’s qualifications and education include:

BSc. (Hons) Computing ‘Networks & Communication’ 1st Class Honors

SCF : SABSA Charted Architect Foundation

CISSP : Certified Information Systems Security Professional

CISA : Certified Information Systems Auditor

CISM : Certified Information Security Manager

ISO 27001 Certified ISMS Lead Auditor

CEH : Certified Ethical Hacker

OSCP : Offensive Security Certified Professional

Access

Lifetime

Content

11.5 hours

Lessons

125

Learn Ethical Hacking from Scratch

Protect Yourself & Your Systems from All Kinds of Security Threats

Description

Course Description

Interested in hacking for the good guys? This comprehensive course will take you from zero to hero in the field of ethical hacking, the career path where you get paid to expose system and network security threats. You’ll explore four main sections: network penetration testing, gaining access, post exploitation, and web app penetration testing to get a complete, well-rounded education in how to responsibly and effectively improve security.

Understand how to gain full access to computer systems w/o user interaction

Create server side & client side attacks

Discover how to interact w/ the systems you’ve compromised

Learn how to detect, prevent, & secure your system & yourself from every attack you learn

Specs

Important Details

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Requirements

Internet required

Instructor

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Access

Lifetime

Content

9.5 hours

Lessons

68

Certified Information Systems Security Professional

Immerse Yourself in Practice Materials for the CISSP, One of the Top Security Certifications on Earth

Description

Course Description

The CISSP is an internationally recognized certification that demonstrates an IT professional’s technical and managerial competence to protect organizations from increasingly sophisticated attacks. It’s an ideal certification for anyone who wants to work in IT as it satisfies all government and professional security certification mandates and leaps out on a resume. In this course, you’ll receive in-depth instruction in all things CISSP, so you can be fully prepared when you decide it’s time to take the exam.

Access 68 lectures & 9.5 hours of content 24/7

Discuss penetration testing & information systems access control

Explore common security architecture frameworks

Understand different network types & topologies

Learn about cryptography, physical security, & operations security

Discuss the legal regulations & liability behind systems security

Specs

Important Details

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Requirements

Internet required

Instructor

Instructor

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

Web Hacking for Beginners

Learn How to Exploit & Secure Websites

Description

Course Description

This course will introduce you to the various methods, tools, and techniques used by attackers. You’ll study web application flaws and their exploitation. Upon completion, you’ll understand major web application flaws and how to exploit a number of dangerous vulnerabilities like SQL injections, CSRF attacks, XSS vulnerabilities, phishing, and more.

Access 23 lectures & 1 hour of content 24/7

Learn how the web works

Use the Vega Web Vulnerability Scanner

Understand SQL injection attacks

Hack WordPress w/ WPscan

Discuss cross-site scripting & cross-site request forgery

Hook victims using BeEF Framework

Gain full control over the target machine

Discover how phishing works

Specs

Important Details

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: beginner

Requirements

Internet required

Instructor

Instructor

Nicolae Juravlea loves computers and technology, particularly in the areas of wireless encryption protocols, web development, network security, and anonymity. He has worked on various projects involving web design, networking, web application security, and other technology-related subjects.

Terms

Unredeemed licenses can be returned for store credit within 15 days of purchase. Once your license is redeemed, all sales are final.